Antwort: [Full-Disclosure] window hiding

2003-11-19 Thread Thomas . Goebhardt
There's another program like this. With own windowlist and additional features. A bit bigger but perhaps also interesting for you: http://www.pizzamampf.de/tools/window-hide.htm Bye Thomas Was planning to just right a patch for win nmap but there was a problem with the sources (no

Re: [Full-Disclosure] Vulnerability in Terminal.app

2003-11-19 Thread Gwendolynn ferch Elydyr
On Wed, 19 Nov 2003 [EMAIL PROTECTED] wrote: There is a vulnerability in Apple's Terminal.app for OS X which affects Apple laptops. When running from the Terminal (within the Unix shell), the command sudo normally will not prompt for a password for five minutes after the password was last

Re: [Full-Disclosure] Vulnerability in Terminal.app

2003-11-19 Thread rixstep
This sounds more like an issue with sudo than terminal. Have you tested to see if sudo displays the same behaviour on other machines? Yes, it is an issue with sudo. It occurs when using Terminal. I ran the text by Apple and they were OK with this description. I understand the title seems

[Full-Disclosure] [securitylab.ru security.nnov] Kerio Winroute Firewall Xroxy problem

2003-11-19 Thread 3APA3A
Application: Kerio Winroute Firewall 5.10 Vendor: Kerio Technologies Inc. Vendor Site: http://www.kerio.com Remote: Yes Exploitable: Yes Risk level: Critical (if proxy requires authentication) Authors: Alexander Antipov 3APA3A (aka Pig Killer) Authors Sites: http://www.securitylab.ru

Re: [Full-Disclosure] defense against session hijacking

2003-11-19 Thread Jakob Lell
On Tuesday 18 November 2003 14:18, Jason Ziemba wrote: I'm not going to claim that my method is fool-proof, but.. If you are using sessions on your site then you should have the ability to track the movement of a user through-out your system. If you record the last page the user was on (with

[Full-Disclosure] Half Life dedicated server information leak and DoS

2003-11-19 Thread 3APA3A
Probably is known, but is not documented: Vendor: Valve software Software: hlds, all versions (including steam). Problem: Information leak, DoS Author: SYZo[SND] Problem: in server configuration, if allowdownload = 1, it's possible to download any file from directory of the current game

Re: [Full-Disclosure] Sidewinder G2

2003-11-19 Thread Ron DuFresne
On Mon, 17 Nov 2003, Shawn McMahon wrote: Daniel Sichel wrote: Host the DNS and sendmail servers directly on your firewall. The operating system should be better protected against a wide-range of exploits. Implementing two of the most common targets of exploit sort of eliminates the

Re: [Full-Disclosure] defense against session hijacking

2003-11-19 Thread Ron DuFresne
On Mon, 17 Nov 2003, Gary E. Miller wrote: Yo Thomas! Some ISPs like AOL use ganged proxies/caches. You may get the same session from different proxies as they round robin. Overly agressive web caches are a big problem for web apps. not to mention that IP's can be spoofed. Thanks, Ron

[Full-Disclosure] Sidewinder G2 Thanks and a question or two

2003-11-19 Thread Daniel Sichel
Thanks to all for the good responses which are, to say the least mildly disturbing. I WAS looking forward to some good night's sleep, but you folks put paid to that! snip They may find a way AROUND it, or socially engineer their way in, sure. Just not THROUGH it. snip Hmmm. Always a disurbing

Re: [Full-Disclosure] Vulnerability in Terminal.app

2003-11-19 Thread hays
--On Wednesday, November 19, 2003 12:00 PM -0500 [EMAIL PROTECTED] wrote: There is a work-around for this vulnerability of course - actually several. 1. Never use sudo (not particularly practical). 2. Never put your box to sleep after a sudo unless at least 5 minutes (or whatever your

RE: [Full-Disclosure] Sidewinder G2 Thanks and a question or two

2003-11-19 Thread Mike Fratto
Basically, version 4.1 failed to do actually do HTTP syntax checking making the HTTP proxy a generic proxy in function. So all the HTTP protocol violation style attacks weren't blocked at all. Proved it using tools off packetstorm. Told SCC about it and proved it to them as well. Then

Re: [Full-Disclosure] Vulnerability in Terminal.app

2003-11-19 Thread Matt Burnett
In order for someone to exploit this they wouldn¹t they need physical access? And if they had physical access they could simple just boot into single user mode (enabled by default), or off a cd (enabled by default), or simply steal the machine. On 11/19/03 12:27 PM, [EMAIL PROTECTED] [EMAIL

Re: [Full-Disclosure] Vulnerability in Terminal.app

2003-11-19 Thread Timo Schoeler
hi, yes, you gotta have physical access. additionally, it must be in an environment the user (who owns/operates the machine) trusts that much, that (s)he leaves the machine _logged in_ *and* put it into sleep mode. don't think it's a big problem. if you don't trust your environment that much

[Full-Disclosure] .hta virus analysys

2003-11-19 Thread Jim Duggan
Afriend contracted this .hta that seems to edit your profile with a link to itself, http://www.talkstocks.net/ attached is the hta file it attempts to run. Its looks to be encoded, which is something i dont know much about but im sure most people on this list will have no problem reading

Re: [Full-Disclosure] .hta virus analysys

2003-11-19 Thread madsaxon
bryce [EMAIL PROTECTED] wrote: I'm new to this list, and sorta new to security on a computer. But can someone tell me what program runs a .hta file?? Sigh. Since no one else seems inclined actually to answer this question, I'll do it. In a (pea)nutshell, Microsoft Internet Explorer is the

Re: [Full-Disclosure] Another noxious M$ trojan

2003-11-19 Thread Gregory A. Gilliss
For all who were interested in reviewing the suspect binaries, I have posted them on my Web site: http://www.gilliss.com/greg/bin/awsqyf.zip http://www.gilliss.com/greg/bin/update1991.zip The first is 52521 bytes and the second is 51529 bytes. Both executables, when uncompressed, measure 106496